Fig. 2From: A state-of-the-art survey of malware detection approaches using data mining techniquesThe signature-based malware detection frameworkBack to article page